I am having problem in one of the customer. i am getting arp and mac for the customer end vlan but the other end ip is not pinging.
SP router >> SP switch >>> media >>>> customer end router
NAGPUR-MSW-01#sh mac address-table dynamic vlan 128 Mac Address Table -------------------------------------------
Vlan Mac Address Type Ports ---- ----------- -------- ----- 128 0017.59fb.fb19 DYNAMIC Fa0/1 128 b0fa.eb8b.74a0 DYNAMIC Fa0/4>>> customer end mac Total Mac Addresses for this criterion: 2 NAGPUR-MSW-01#sh run int Fa0/4
NAGPUR-PE-01#sh run int Gi0/3.128>>> customer config Building configuration...
Current configuration : 367 bytes ! interface GigabitEthernet0/3.128 description CIPLA Rajkamal Commercial Complex,512k TDN BACKUP 2-7-13 encapsulation dot1Q 128 ip vrf forwarding CPLA:0720 ip address 10.135.160.25 255.255.255.252 rate-limit input 512000 64000 64000 conform-action continue exceed-action drop rate-limit output 512000 64000 64000 conform-action continue exceed-action drop end
NAGPUR-PE-01#p vrf CPLA:0720 10.135.160.26>>> customer end
Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.135.160.26, timeout is 2 seconds: ..... Success rate is 0 percent (0/5)
NAGPUR-PE-01#sh ip arp vrf CPLA:0720 Protocol Address Age (min) Hardware Addr Type Interface Internet 10.135.160.25 - 0017.59fb.fb19 ARPA GigabitEthernet0/3.128 Internet 10.135.160.26 0 b0fa.eb8b.74a0 ARPA GigabitEthernet0/3.128>>> arp NAGPUR-PE-01#
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...